signalsayge

joined 5 months ago
[–] signalsayge 5 points 6 days ago

This is what I'm doing as well. The nice thing about it is that it supports different sized drives in the same mergerfs mount and with snapraid, you just need to make sure one of your biggest drives is the parity drive. I've got 10 drives right now with 78TB usable in the mergerfs mount and two 14TB drives acting as parity. I've been able to build it up over the years and add slowly.

[–] signalsayge 4 points 1 week ago (1 children)

It sounds to me that for your specific use case, the tailscale free option would be a better match. You can self host it if you would like, using headscale (involves a little more work though). It's basically like an orchestrator for wireguard tunnels.

I'm running tailscale on quite a few of my systems. I've configured the Grants (like advanced ACL's) to allow for only specific services available from certain hosts while other hosts can act as exit nodes like a VPN egress. I've found it very useful for connecting families networks up so that I can assist with remote troubleshooting help and I've used it to reach back into my own network while traveling.

[–] signalsayge 28 points 1 week ago* (last edited 1 week ago) (5 children)

The article literally starts off with a mass produced $800 Sodium Ion battery that you can buy right now.

[–] signalsayge 1 points 3 weeks ago

Very few people actually change their SSID. The bigger point is that, considering sites like Wigle.net exist and the Google Street view cars were designed to capture all SSID data (they hired the guy who made NetStumbler, a popular open source SSID scanning tool in the early 2000's), it's trivial to get within a few hundred feet with just a few SSID's in an area. When your neighbor has an SSID of Comcast-12345 (aka random string), there is probably only one location that has your SSID and the Comcast one in the same location. You can change your SSID every day, but your neighbors probably don't change theirs.

[–] signalsayge 7 points 1 month ago* (last edited 1 month ago) (1 children)

Tailscale would probably be easier for this. Install tailscale on the server and configure only that service available in the tailscale dashboard. I've used this method for ssh access to family members devices.

I'm sure you could run the same setup using headscale (tailscale self hosted), it would require a bit more setup though and dynamic dns would probably have to be working.

[–] signalsayge 1 points 2 months ago

That's why I also self host the scripts I've vetted...

[–] signalsayge 1 points 2 months ago

I know the process. There's also the option of attaching an ESXi datastore to a Proxmox system and importing it that way. The PCIe passthrough makes it a little more complex but not insurmountable. I've built the Proxmox server on another host with 10Gbe ports and am going to rebuild that way. Export the config, modify what I need to, import the sections I need and swap cables.

Once I've swapped hardware, I'm putting Proxmox on the current VMware host and I'll have a backup system just in case of hardware failure.

I'm also doing some other stuff, replacing HAProxy with Caddy, maybe deploy a grafana dashboard so I can start monitoring all 60+ services on my network, and configure my network for IPv6.

[–] signalsayge 3 points 2 months ago (3 children)

I know there are a lot of recommendations here, but I can provide some insight as someone who has been looking into this heavily for the past several months.

I will start by saying that the GL.iNet Flint 2 running OpenWrt is probably going to be your best option. It meets your price point and concerns. The Flint 3 is an upgrade that just came out that could also be considered, but is currently at $190. I currently have the Flint 2 running at my mom's house providing her network coverage. It's a nice all in one device and I believe she's running a 500Mbps service.

Some of the other responses here mention OPNSense. That's what I'm running right now as a virtual machine. I'm using TP-Link Omada access points for Wi-Fi coverage. OPNSense or PFSense might be a bit much to start. They are good options, but can get rather advanced quickly and still require a method to provide Wi-Fi. I'd been looking at replacements heavily lately, but decided to stick with OPNSense (I just have to migrate it from running on VMware ESXi to Proxmox now).

[–] signalsayge 33 points 3 months ago (1 children)

I guess it's a shitpost because Hawaii is not technically covered by NATO...

https://www.snopes.com/fact-check/hawaii-not-in-nato/

[–] signalsayge 2 points 4 months ago (2 children)

Is your firewall allowing port 443 (https) traffic?

[–] signalsayge 1 points 5 months ago (1 children)

I feel like you could have said the same thing about Chavez and Maduro in Venezuela...

view more: next ›